supported by the National HighTech Research and Development (863) Program (No. 2015AA016002);the National Key Basic Research Program of China (No. 2014CB340600);the National Natural Science Foundation of China (Nos. 61303024 and 61272452);the Natural Science Foundation of Jiangsu Province (Nos. BK20130372)
In Trust Zone architecture, the Trusted Application(TA) in the secure world does not certify the identity of Client Applications(CA) in the normal world that request data access, which represents a user data leaka...